Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05/03/2024, 20:22
Static task
static1
Behavioral task
behavioral1
Sample
b59455b6fe909a0e17f48c2e2f398163.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b59455b6fe909a0e17f48c2e2f398163.exe
Resource
win10v2004-20240226-en
General
-
Target
b59455b6fe909a0e17f48c2e2f398163.exe
-
Size
82KB
-
MD5
b59455b6fe909a0e17f48c2e2f398163
-
SHA1
37bdf919b77ddabec9c4b17443d9824c5ea9810a
-
SHA256
5f9d268dee7237819dfcae2c1bc401986b0714a7c826bec6ba3511c6fb867122
-
SHA512
97cd010933b2f17644d77a628410d3dc774a0dc7a97e4a4e4c126cd2f89344706eeffd96d5cdbe192b79707815ae26733daef7e5808d7a786f22aedd1251e78e
-
SSDEEP
1536:+tBhDyOsCXl8civbCuc1HV362pgPgkD8lXM+zajSdcHoocm44GjLP0OiiRWMTPP4:+BDyOsuWYWEPP0CRfTPZtRkAQlo+zk2D
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2364 b59455b6fe909a0e17f48c2e2f398163.exe -
Executes dropped EXE 1 IoCs
pid Process 2364 b59455b6fe909a0e17f48c2e2f398163.exe -
Loads dropped DLL 1 IoCs
pid Process 2804 b59455b6fe909a0e17f48c2e2f398163.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2804 b59455b6fe909a0e17f48c2e2f398163.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2804 b59455b6fe909a0e17f48c2e2f398163.exe 2364 b59455b6fe909a0e17f48c2e2f398163.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2804 wrote to memory of 2364 2804 b59455b6fe909a0e17f48c2e2f398163.exe 29 PID 2804 wrote to memory of 2364 2804 b59455b6fe909a0e17f48c2e2f398163.exe 29 PID 2804 wrote to memory of 2364 2804 b59455b6fe909a0e17f48c2e2f398163.exe 29 PID 2804 wrote to memory of 2364 2804 b59455b6fe909a0e17f48c2e2f398163.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\b59455b6fe909a0e17f48c2e2f398163.exe"C:\Users\Admin\AppData\Local\Temp\b59455b6fe909a0e17f48c2e2f398163.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Users\Admin\AppData\Local\Temp\b59455b6fe909a0e17f48c2e2f398163.exeC:\Users\Admin\AppData\Local\Temp\b59455b6fe909a0e17f48c2e2f398163.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2364
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD5d30fdcf5ddc4925470e861739218b847
SHA1cef2edfd109762707a0bbebee16567e6f1ea2feb
SHA25696cb71a6c064ecd3a02c34a53be5bc10fab4c2452d11bb933ba633674d9ef06e
SHA5121f7947af57c14e5b346506f1635c8e8aa1130cf54eb1390ef154cfa3ddf70ca7234dad4000b6cc66ab8b9175551add531166dab6f89acfa4d3fd14273dd4cda7